Proxy Detection Test for 212.247.11.156

Tele2 SWIPnet - Stockholm, Stockholm, SE

212.247.11.156 (static-212-247-11-156.cust.tele2.se) is an IP address located in Stockholm, Stockholm, SE that is assigned to Tele2 SWIPnet (ASN: 1257). Due to this IP addresses' location, it is based on the Europe/Stockholm timezone.
This IP address (212.247.11.156) is a proxy connection and is NOT associated with any recent SPAM/mail blacklist activity.
IPQ's fraud scoring algorithm has rated this IP address as suspicious, scoring 55 out of 100. Connections from this IP address may warrant additional scrutiny and verification.

Use this tool to lookup IP Address details and retrieve the hostname, ISP, location, ASN, timezone, and other information that can be extracted. The IP Address will also be analyzed to detect a proxy or VPN connection through our proxy detection technology & checked against known blacklists for any reports of SPAM or abuse. This tool can perform both IPv4 address lookups and IPv6 address lookups.

This service can be queried via an API lookup or by using our JavaScript analysis tags to detect bad sources of traffic and malicious users. You can also process a batch report by uploading a CSV file through our user dashboard.

Easy API documentation and example code is available to get IPQ's proxy detection service running on your site in just minutes!

What is an IP Address?

An IP Address, also known as "Internet Protocol", is a unique identifier assigned to a user browsing the internet through their Internet Service Provider (ISP). Just as we use an email address or phone number to identify a person, an IP address is linked to an individual user and can be associated with their online activity. A reputation can also be established with each IP address to make it easy to identify high risk users. It can be difficult for users to frequently switch an assigned IP address from their ISP, which is why internet users often use proxies to mask their identity.

What is a Proxy Connection?

Proxies are used to mask the identity of a user by processing the internet connection through another server. A proxy connection is made via a proxy server, which serves as a hub through which internet requests are processed between websites and the end user. Websites receiving these requests would only see the proxy server's IP address and not the user's real IP address. Therefore, a user in another country could mask their true location details to bypass geo restrictions and remain anonymous. Abusive users also utilize proxies to engage in fraudulent activity such as creating duplicate accounts, posting SPAM, or generating fraudulent transactions from different proxy IP addresses without revealing their true identity.

What Info Can I Get From an IP Address Lookup?

Many users are surprised by how much data they can gain by performing an IP Address lookup. Location information may be one of the most useful data points, and is usually accurate within 25 miles of the actual user. IP address lookups can also provide more technical data points such as the Internet Service Provider (ISP), time zone, Autonomous System Number (ASN), blacklist status, hostname, device details, and the status of the IP address as a proxy connection. Our service also provides a fraud score which determines how likely a user on this IP address is to engage in abusive behavior. Unfortunately, it is not possible to extract a person's name, physical address, email address or phone number from an IP address.

Does Proxy Detection Work?

Proxy detection can work exceptionally well with the right service provider to uncover users hiding their identity behind an anonymized connection. The worst offenders of fraud can control millions of IP addresses at one time. This is a great challenge for proxy detection service providers that must monitor IP addresses 24/7 for newly compromised devices which could serve as a proxied connection. IPQualityScore provides the most accurate proxy detection service in the industry, catching desktop & mobile devices as soon as they become compromised by botnets, allow tunneled connections, or exhibit high risk activity.